First published: Thu Aug 05 2010(Updated: )
Stack-based buffer overflow in the IConfigurationAccess interface in the Invensys Wonderware Archestra ConfigurationAccessComponent ActiveX control in Wonderware Application Server (WAS) before 3.1 SP2 P01, as used in the Wonderware Archestra Integrated Development Environment (IDE) and the InFusion Integrated Engineering Environment (IEE), allows remote attackers to execute arbitrary code via the first argument to the UnsubscribeData method.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Invensys Wonderware ArchestrA Configuration Access Component ActiveX Control | ||
Invensys Infusion Integrated Engineering Environment | ||
Invensys Wonderware Application Server | <=3.1 | |
Invensys Wonderware Application Server | =2.0 | |
Invensys Wonderware Application Server | =2.1 | |
Invensys Wonderware Application Server | =3.0 | |
Invensys Wonderware Application Server | =3.1 | |
Invensys Wonderware Application Server | =3.1-sp1 | |
Invensys Wonderware Archestra Integrated Development Environment |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2010-2974 is classified as a high severity vulnerability due to its potential for remote code execution.
To fix CVE-2010-2974, update to Wonderware Application Server version 3.1 SP2 P01 or later.
CVE-2010-2974 affects the Invensys Wonderware Application Server versions prior to 3.1 SP2 P01 and versions 2.0, 2.1, and 3.0.
CVE-2010-2974 involves a stack-based buffer overflow in the IConfigurationAccess interface of the Invensys Wonderware Archestra ConfigurationAccessComponent ActiveX control.
No, the Invensys Wonderware Archestra Integrated Development Environment is not affected by CVE-2010-2974.